Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security The Military

Pentagon Seeks a New Generation of Hackers 134

Hugh Pickens writes "Forbes reports on a new military-funded program aimed at leveraging an untapped resource: the population of geeky high school and college students in the US. The Cyber Challenge will create three new national competitions for high school and college students intended to foster a young generation of cybersecurity researchers. 'The contests will test skills applicable to both government and private industry: attacking and defending digital targets, stealing data, and tracing how others have stolen it. [...] The Department of Defense's Cyber Crime Center will expand its Digital Forensics Challenge, a program it has run since 2006, to include high school and college participants, tasking them with problems like tracing digital intrusions and reconstructing incomplete data sources. In the most controversial move, the SANS Institute, an independent organization, plans to organize the Network Attack Competition, which challenges students to find and exploit vulnerabilities in software, compromise enemy systems and steal data. Talented entrants may be recruited for cyber training camps planned for summer 2010, nonprofit camps run by the military and funded in part by private companies, or internships at agencies including the National Security Agency, the Department of Energy or Carnegie Mellon's Computer Emergency Response Team.'"
This discussion has been archived. No new comments can be posted.

Pentagon Seeks a New Generation of Hackers

Comments Filter:
  • Re:Foreigners?? (Score:3, Informative)

    by Jeian ( 409916 ) on Friday May 22, 2009 @03:03PM (#28057803)

    Literally any governmental or military job that involves dealing with classified information, requires you to be a US citizen. I imagine this would be no different.

  • Re:Cybersecurity (Score:2, Informative)

    by morgan_greywolf ( 835522 ) on Friday May 22, 2009 @03:23PM (#28058057) Homepage Journal

    Isn't it funny that whenever there is talk about security it generally means the opposite?

    Well, it makes sense. In order to defend a secure system/network, you must first know multiple ways to break into that secure system/network. Posers doing "IT security" jobs that don't know what they're doing are for sure going to drop the ball and get pwned.

  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Friday May 22, 2009 @03:27PM (#28058097)
    Comment removed based on user account deletion
  • by NES HQ ( 1558029 ) on Friday May 22, 2009 @03:32PM (#28058163)
    Not sure how long ago you tried to do this, but there are a number of colleges (Bachelors and post-grad) that offer solid Infosec programs now (disclaimer, there are just as many that offer crappy Infosec programs). In-depth training and certification is available for most major/widely-deployed Infosec products, such as Snort (http://www.sourcefire.com/services/education). Also, there are professional training organizations (e.g. SANS) that offer excellent [mostly] vendor-neutral Infosec training. Infosec as an actual field is fairly young, so it's not surprising that there isn't an Infosec program at every college in the country, but there are numerous high-quality training options available.
  • by Anonymous Coward on Friday May 22, 2009 @03:42PM (#28058265)

    It could be computers...or it could be stereo speakers.

    You're a moron. No offense. We're not talking about the bullshit hacking that lifehackers do. The kind of hacking we're talking about is specifically breaking computer security. This involves exploits, buffer overflows, timing attacks, DNS poisoning, spoofing, shell code, etc, etc... All those things can most certainly be taught though mastering these topics, or any topic, requires practice and experience. There's nothing abstract about that.

  • by Propaganda13 ( 312548 ) on Friday May 22, 2009 @03:47PM (#28058341)

    Things like this can be taught by books or professors.

    You start off with ground work on information security, networking, and penetration testing. You learn how things are being protected, how known flaws were exploited in the past, and what traces were left behind.

    It's the same steps as being a programmer. The great ones love it, understand it, and spend their free time doing it. The average ones just tread where the great ones have gone before.

  • sans.org (Score:2, Informative)

    by Frigga's Ring ( 1044024 ) on Friday May 22, 2009 @03:49PM (#28058355)
    SANS.org offers a whole lot of courses regarding InfoSec. Start with SANS 401 unless you feel you really need the into 301. Sadly, they get pretty pricey if you don't have a company reimbursing you.
  • by Aragorn DeLunar ( 311860 ) on Friday May 22, 2009 @04:03PM (#28058531)

    The purpose of the polygraph isn't to find out if you are lily-white. It is largely to determine if you can be blackmailed. If you are truthful about your "indiscretions", you can't be blackmailed. On the other hand, someone who is willing to lie on a polygraph clearly has some shame issues that could be exploited by a hostile agent. Obviously, admitting to a felony or intent to subvert the government isn't going to get you anywhere.

  • Re:Culture vs Goals (Score:3, Informative)

    by jeff4747 ( 256583 ) on Friday May 22, 2009 @06:30PM (#28060133)

    You're forgetting a few details:

    First, there's military contractors to work for, which have a more 'pleasant' attitude. On top of that, the DoD folks in this area aren't exactly your normal "grunt".

    Second, the level of challenges are going to be extremely high. You're not trying to break in to some web server set up by a marginally-competent IT guy. You're working against (and with) the best on the planet.

    Third, you put a few years in at the DoD, and you come out with a security clearance and very attractive resume. If you decide you don't want to keep working for the DoD, you can make a lot more money than if you only did your hacking 'on the side' while writing database apps.

    Fourth, no jail time. "Pwn" servers all day, and if they somehow trace it back to you, you don't spend a few years being Bubba's special friend.

    Lastly, you're seeing so many "hacker recruiting" programs because there's metric craploads of money being thrown at anything "Cyberwarfare".

  • Re:Foreigners?? (Score:2, Informative)

    by zemkai ( 568023 ) on Friday May 22, 2009 @07:07PM (#28060485)
    Hoglund / McGraw - Exploiting Software
    Hoglund / Butler - Rootkits
    Aitel / Eren (Hi Sinan!) / et al - The Shellcoder's Handbook
    McClur - Hacking Exposed
    Dowd / et al - The Art of Software Security Assessment
    Szor - The Art of Computer Virus Research and Defense

    ... just a few of the ones I found good that are within arm's reach. That is assuming you learn by reading.

    Oh, and the vast majority of exploits target one form of buffer overflow or another. Stack based, heap based... learn your buffer overflows and you're in the door.

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...